When the trial
judge denied his motion, Folkman entered a plea of no contest to the charge of
operating a motor vehicle while intoxicated and was found guilty. State v. Folkman, supra.Folkman appealed.State
v. Folkman, supra.The opinion does not say what, if any,
penalty the judge imposed, but this site outlines the possibilities.

This,
according to the brief Folkman filed on appeal, is how the case arose:

In the early morning hours of May 27, 2012. Shawano Sheriff
Deputy B. Klenke was on patrol in the Village of Cecil. . . . At approximately
2:30 AM, Klenke observed a vehicle traveling northbound on N. Warrington Ave.,
approaching State Highway 22. . . . Klenke did not see anything unusual about
the vehicle: for example, [it] was not speeding, nor was it going too slow, it
was traveling within its lane boundaries without problem and all of the
vehicle's running lights were operating normally. . . .

Nevertheless, after Klenke observed the vehicle's front
license plate, he ran the vehicle's registration through the eTime system: the
system returned a match for the same vehicle. . . . After doing that, Klenke
decided to run the registered owner of the vehicle, who was . . . Folkman. . .
. Klenke learned upon running Daniel’s registration check that his driver's
license had been expired for about four months. . . .

Upon learning of Daniel's expired status. Klenke turned his
vehicle around, activated his emergency lights and initiated a traffic stop. .
. . Klenke made contact with Daniel, who was the driver of the vehicle, and
after obtaining information that lead [him] to believe Daniel was impaired
arrested him for suspicion of Operating While
Intoxicated. . . .

This is how the prosecution’s brief on appeal
explains how the prosecution arose:

On May 27, 2012, at approximately
0230 Shawano County Deputy Ben Klenke was on patrol in the Village of Cecil in
Shawano County when he observed a vehicle northbound on North Warrington Avenue
approaching Hwy 22. . . . He observed the vehicle's front registration plate as
Wisconsin auto 606CCT. Klenke then ran the vehicle's registration through eTime
and the return matched the vehicle he saw. . . .

Klenke then ran the registered
owner of the vehicle, Daniel Folkman, through the same eTime System and Folkman
had an expired license and it had been expired for approximately four (4)
months. . . . Klenke turned around and caught up to the vehicle on CTH H just
west of CTH R, activated his
emergency red and blue lights and initiated a traffic stop on the vehicle. . .
. After notifying dispatch of his location Klenke approached the vehicle and
made contact with the driver. . . .

The driver was the only person in
the vehicle. . . . Klenke explained why he stopped the vehicle and asked for a
driver's license. . . . The driver admitted he was Daniel Folkman. . . . Klenke
. . . then made observations of the driver and after Folkman refused to do Standard
Field Sobriety Tests Folkman was placed under arrest for Operating While
Intoxicated.

On appeal, Folkman argued that the trial judge
erred in denying his motion to suppress.State v. Folkman, supra. In his motion, Folkman “conceded Klenke
lawfully viewed his license plate number and that, once Klenke knew the
vehicle's owner was not validly licensed, Klenke had reasonable suspicion to
stop the vehicle.”State v. Folkman, supra.

The concession means Folkman was not claiming that
Klenke’s looking at and reading his vehicle license plate was a “search” under
the 4th Amendment.As I have
explained in prior posts, the 4th Amendment creates a right to be
free from unreasonable searches and seizures, and a “search” violates a
“reasonable expectation of privacy” under the Supreme Court’s decision in Katz v. U.S., 389 U.S. 347 (1967).So Folkman was not claiming he had a
reasonable expectation of privacy in his license plate, which would not have
been a viable argument; under Katz,
he forfeited any expectation of privacy in the plate by “knowingly exposing” it
to public view.

By conceding that Klenke had “reasonable suspicion”
to stop his vehicle, Folkman was not claiming the “stop” of him and his
vehicle was an “unreasonable” seizure in violation of the 4th
Amendment’s ban on unreasonable searches and seizures.As Wikpedia notes, a traffic stop is a 4th
Amendment “seizure” of a person because it interferes with the person’s freedom
of movement.As Wikipedia also notes,
under the Supreme Court’s decision in Delaware v. Prouse, 440 U.S. 648 (1979),

an officer has made an illegal seizure when he stops an
automobile and detains the driver in order to check his driver's license and
the registration of the automobile, unless the officer has articulable and
reasonable suspicion that a motorist is unlicensed or that an automobile is not
registered, or either the vehicle or an occupant is otherwise subject to
seizure for violation of law.

Here, Folkman claimed Klenke’s stopping him and his
vehicle “was unlawful because Klenke needed, but did not have, `some exigent circumstance’ in order to begin querying registration and driver's license
information on the eTime system.”State v. Folkman, supra.In other words, Folkman claimed Klenke’s
running checks on his registration and license information was a 4th
Amendment “search”, and for such a search to be “reasonable” Klente had to either
have a search warrant (which he did not ) or his actions had to be authorized
by an exception to the 4th Amendment’s default requirement that
searches be justified by a warrant.Folkman claimed (i) the exigent circumstance exception did not apply
here and (ii) because it did not apply Klente’s actions violated the 4th
Amendment. State v. Folkman, supra.

The judge denied Folkman’s motion to suppress
because he found the issue presented was

`whether the
running of . . . registration information . . . violate[s] any type of 4th
Amendment issues.’ The court stated to answer that question it needed to
determine whether there is `a reasonable privacy expectation that individuals,
including law enforcement officers, will not be able to check the
registration[.]’ The court concluded individuals do not have a reasonable
expectation of privacy in registration or license information. It reasoned, `when
you have your plate, it's made visible’ and must remain visible per law. The
court explained a license plate is required to be visible so that

`officers can see your plate.
Also, you have to register your vehicle with the State. Everyone knows that it
is subject to check. It can be checked by law enforcement. So I don't think
that anyone has a reasonable expectation of privacy that an officer will not
run that plate. So, I do believe that an officer can legally, under ... our
State law and under the U.S. Constitution, . . . run a license check on your
vehicle without having probable cause that a crime was committed.’

State
v. Folkman, supra.

On appeal, Folkman did not “directly address the
circuit court's conclusion that he lacked a reasonable expectation of privacy
in his registration and license information on the eTime system.” State v. Folkman, supra. Instead, he
repeated the argument noted above, i.e., that “Klenke needed `exigent circumstances’
before he could query information about Folkman's registration and license.” State v. Folkman, supra.

In making that argument, Folkman relied on two
cases, the first of which was the Supreme Court’s decision in Delaware v. Prouse, supra.In Prouse, the Court held that unless an
officer has “reasonable suspicion that a motorist is unlicensed or that an
automobile is not registered, or that either the vehicle or an occupant is
otherwise subject to seizure for violation of law,” it is a violation of the 4th
Amendment for the officer to stop the vehicle and detain “in order to check his
driver's license and the registration of the automobile”. State v.
Folkman, supra.

He also relied on the Wisconsin Supreme Court’s
decision in State v. Lord, 297 Wis.2d
592, 723 N.W.2d 425 (2006), in which that court held that it violates the 4th
Amendment for an officer to stop a vehicle and detain a driver “without
probable cause or reasonable suspicion simply to check the registration and
license information.”State v. Folkman, supra.More precisely, Folkman argued that

`[t]he only difference between
the facts in Lord and the instant case is that the officer
physically stopped Lord's car to check his vehicle registration because Lord
was displaying temporary plates that could not be checked through the eTime
system.’

He contends, `carrying the holding of Lord to its
logical conclusion, since Klenke had no knowledge of any other independent
exigent circumstances regarding [Folkman] or his vehicle, his running the
vehicle's license plate was unreasonable, . . .a violation of [Folkman's] 4th
Amendment right against unreasonable search[es] and seizure[s].’

State
v. Folkman, supra.

The Court of Appeals did not agree, noting there is
“a considerable difference” between an

officer stopping, or seizing,
a vehicle to check the registration and license information and an officer
running registration and license queries in a law enforcement database. In the
former situation, it is well-established that an individual possesses `a
reasonable expectation of privacy, under the 4th Amendment . . . to travel free
of any unreasonable governmental intrusion.’ State v. Harris, 206
Wis.2d 243, 557 N.W.2d 245 (Wisconsin Supreme Court 1996).

Because individuals have a
reasonable expectation of privacy to travel free from government intrusion, any
intrusion on an individual's travel must be reasonable to be
constitutional. See State v. Popke, 317 Wis.2d 118, 765 N.W.2d
569 (Wisconsin Supreme Court 2009). `A traffic stop is generally reasonable if
the officers have probable cause to believe that a traffic violation has
occurred, . . . or have grounds to reasonably suspect a violation has been or
will be committed.’ State v. Popke, supra.

State
v. Folkman, supra.

The court therefore noted that “[n]either Prouse nor Lord
establish Folkman has a reasonable expectation of privacy in his
registration and driver's license information.”State v. Folkman, supra.As I noted earlier, if he did not have such
an expectation of privacy in that information, it was not a 4th
Amendment “search” for Klente to run a check on either or both, which meant
Klente did not need either reasonable suspicion or probable cause or a warrant
or an exception to the warrant requirement in order to do so without violating the 4th Amendment.

Folkman had one final argument on that issue. As
the Court of Appeals noted

[he] argues . . . that he has an
expectation of privacy in the information because it is `inaccessible to
civilians, and is only usable by government officers in the exercise of their
police powers[.]’

He then likens the State's
collection of registration and driver's license information to the National
Security Agency's purported `hacking’ and collection of personal emails and
telephone conversations. He asserts that, because the federal government has
stated it will only examine the information it collected if it has a valid
reason to do so, it must follow that `Klenke had every right to access the
eTime system so long as he has a valid reason for doing so.’

State
v. Folkman, supra.

Once again, the Court of Appeals did not agree,
explaining that Folkman’s argument

fails to establish he has a
reasonable expectation of privacy in his registration and license information.
As previously stated, an individual has a reasonable expectation of privacy if
the individual has a subjective expectation of privacy that society recognizes
as reasonable. . . .

That individuals have an
expectation of privacy in personal emails and telephone conversations that were
collected through `hacking’ does not mean individuals have the same expectation
of privacy in vehicle registration and licensing information, which, as the
circuit court observed, is information that individuals are required to submit
to the state.

State
v. Folkman, supra.

It held, therefore, that Folkman

has the burden of proving by a
preponderance of the evidence that he has a reasonable expectation of privacy
in the information. . . . Because he failed to establish he
has a reasonable expectation of privacy in the information, Folkman has not
triggered the 4th Amendment's prohibition against unreasonable searches and
seizures. . . .

State
v. Folkman, supra.So the
court affirmed Folkman’s conviction. State
v. Folkman, supra. If you are interested, you can read a little more about the case in the story you can find here, including a statement from Folkman's lawyer, who wants the Wisconsin Supreme Court to hear the case because "police should not be allowed to randomly check license
plates without a good reason."

Section 1951(a) makes it a federal crime to
obstruct, delay or affect commerce by “robbery or extortion” or by committing
or threatening physical violence against “any person or property”.Section 924(c)(1)(A)(i) makes it a federal
crime to use or carry a firearm “during and in relation to any crime of
violence or drug trafficking crime”.

The only information I can find about how the case arose is
in this opinion, and all it says is at the evidentiary hearing on the motion to
suppress,

[Federal] Agent Spence Burnett
testified that [Dixon] was arrested on an arrest warrant issued on the basis of
a complaint charging him with conspiracy to rob an individual he believed was a
drug trafficker and with possession of firearms in relation to the conspiracy. .
. .

Burnett confirmed [Dixon] was arrested
as he exited a building and was handcuffed and secured at that time. . . .
Burnett also testified that before the arrest he was aware of information
indicating [Dixon] had used telephones in connection with the commission of the
offense for which he was being arrested.

U.S. v. Dixon, supra.

Dixon moved to suppress “any evidence obtained from the
search of his Samsung cell phone by an agent with the Bureau of Alcohol, Tobacco,and Firearms (`BATF’) conducted after it was seized from him at the time of his
arrest”. U.S. v. Dixon, supra. According to the opinion, this is how the
search came about and what it involved:

[T]he only phone at issue is the
Samsung cell phone [Dixon] had open in his hand and was using when he was
arrested. . . . [It] is a Samsung Galaxy `smart-phone’ with an Android
operating system. . . . Agent Daniel Arrugueta with BATF testified that he was
present when [Dixon] was arrested and that he was the agent who seized the
phone. . . .

[Dixon] had exited a nearby building
and was starting to get into his car when he was arrested. . . . He was ordered
to put his hands on the car. . . . The phone . . . was taken from him and put
on top of the car. . . . Arrugueta seized the phone off of the car roof and
took the phone back to his office. . . .

Arrugueta testified that when he got back to his
offices he extracted the data from [Dixon’s] cell phone, from the phone itself
and from the micro `SD Card,’ a storage media in the phone. . . . He is trained
in extracting evidence as a `Computer Examiner.’ . . . He used a device called
`Cellebrite’ which plugs into the phone to extract data from the phone. . . .

While he was performing his extractions, Arrugueta called
Agent Spence to be sure the process of booking [Dixon], which was being done at
a different location, was still ongoing so that his search would be `within the
parameters of the incident to arrest.’ . . . He was advised [Dixon] was still
being booked. . . . He burned CDs of the information he extracted from the
phone. . . .

Arrugueta had no concern that the
device was dangerous. . . . But he also allowed as how there is always concern
that data might disappear by virtue of a `remote wipe.’ . . . Therefore, the
first thing Arrugueta would do would be to turn the phone off and take out the
battery. . . . These actions eliminate the possibility that the phone could be
wiped remotely. . . .

Arrugueta did not do a `full dump’ on
the phone because that process can take hours and likely would extend beyond
arrest and booking. . . . He would usually get a warrant if a `full dump’ were
needed. . . . But he did extract data from the SD card, a form of storage
media, which took about thirty minutes. . . . Arrugueta considered the cell
phone to be a `container’ that he could go through as long as it was done while
the booking process was still ongoing. . . .

U.S. v. Dixon, supra. The
reference to the agent’s assuming the phone was a “container” indicates he thought
it was an item he could search without obtaining a search warrant under the
search incident exception to the 4th Amendment’s default requirement
that officers have a warrant to search someone’s property.

In his motion to suppress, Dixon argued that the warrantless
search of his phone

U.S. v. Dixon, supra. In U.S. v. Robinson, 414 U.S. 218 (1973),
the Supreme Court held that when an officer arrests someone, he can search the
arrestee and anything he/she is carrying for either or both of two
reasons:to disarm the suspect and/or to
find and take possession of any evidence the person is carrying to prevent it
from being destroyed.

The prosecution argued, in response, that the search of the
cell phone fell within the

well-established exception to the
warrant requirement permitting searches and seizures from persons incident to
their arrest. . . . The government argues that this exception encompasses the
right to search any closed containers, including a cell phone taken from the
arrestee's person, and Arizona v. Gant does not limit this
well-established exception.. .
. The government alludes to the risk the phone could be remotely locked
or its data remotely deleted, implicating the need to preserve evidence. . . .

U.S. v. Dixon, supra.

The judge began her analysis of the arguments by noting that
the issue presented in

is whether the search of [Dixon’s] cell
phone . . . was authorized under . . . the `search incident to arrest’ exception
to the warrant requirement. The government relies upon this `long-standing’
exception to the warrant requirement permitting not only the seizure of items
from the arrestee's person but the search of any container, to include
cigarette packs and cell phones, found on the arrestee as well, even when made
after the actual arrest back at the agents' offices.

The government cites U.S. v.
Robinson,supra (upholding
search of closed cigarette package on arrestee's person); U.S. v.Edwards, 415 U.S. 800 (1974) (warrantless search and seizure of
Defendant's clothing ten hours after arrest upheld where search of clothing
could have been made `on the spot’); U.S. v. Finley, 477 F.3d
250 (U.S. Court of Appeals for the 5th Circuit 2007) (upholding search
of cell phone incident to arrest); and U.S. v. Flores–Lopez, 670
F.3d 803, 810 (U.S. Court of Appeals for the 7th Circuit 2012) (upholding
search incident to arrest of cell phone for its phone number but questioning
whether more invasive search would be permissible).

as having changed the calculus used to
determine the applicability of this exception to seizure of cell phones. [He]
also highlights recent authority in the wake of Gant that
limits the warrantless search of cell phone data seized incident to
arrest. See U.S. v. Wurie, 2013 WL 2129119 (U.S. Court of Appeals for the 1st Circuit 2013) (`the
search-incident-to-arrest exception does not authorize the warrantless search
of data on a cell phone seized from an arrestee's person, because the
government has not convinced us such a search is ever necessary to protect
arresting officers or preserve destructible evidence’); Smallwood v. State, 113
So.3d 724 (Florida Supreme Court 2013) (`while law enforcement officers
properly separated and assumed possession of a cell phone from Smallwood's
person during the search incident to arrest, a warrant was required before the
information, data, and content of the cell phone could be accessed and searched
by law enforcement.’).

U.S. v. Dixon, supra.

The judge then began her analysis of the issue, noting that
if “if Robinson and its progeny were the governing authority
applicable in this case, it would not be difficult to conclude that the search
in this case should be sustained, so long as it was considered to be incident
to [Dixon’s] arrest.”U.S. v. Dixon, supra. She noted, though, that several factors

make this case more
difficult. For one thing, this case involves the extraction and seizure of data
and private information from a cell phone.

A second factor is that the search
of the cell phone, while roughly contemporaneous with [Dixon’s] arrest,
booking, and interview, was conducted at the agents' offices, outside of [his]
presence, after [he] had been taken into custody and removed to another
location for booking and interview, and involved much more than just a limited
search for the phone's log history or recent calls.

Superimposed upon these
factors is the fact that Arizona v. Gant was decided in April
of 2009 and casts the prior legal authority in a different light.

U.S. v. Dixon, supra. As to Gant,
she explained that in its opinion, the Supreme Court made it clear that in
applying the search incident to arrest exception, it intends to enforce the two
original justifications for it, i.e., to disarm the suspect and/or find evidence.

She then took up the issues in the case, pointing out that
Dixon was not challenging the

seizure of the phone; instead, he
challenges the search of the phone that was conducted after the arrest, away
from the scene of the arrest, outside of [his] presence at the agent's office,
where the agent plugged a device into the phone and extracted the data from the
phone itself and from its `SD card.’ . . .

Recently, at least one circuit court
and one state supreme court have addressed similar situations involving
seizures and searches of cell phones and have concluded . . . that such a
search violates the 4th Amendment. See U.S. v. Wurie, supra; Smallwood
v. State, supra.

U.S. v. Dixon, supra.

The judge found that Arrugueta lawfully seized Dixon’s phone
under the search incident exception, but

went beyond merely seizing the phone,
examining it to ascertain that it was not a weapon, and preserving it. He took
it back to his office and extracted all the data he could extract using a data
extraction device. This intrusion was more than minimal.

U.S. v. Dixon, supra.

She therefore found that this was not a case in which there
was

any threat that the arrestee might use
the cell phone as a weapon, in view of the fact that the phone had been
immediately seized from him, and, secondly, because it was immediately
ascertained that it was not a weapon. Nor is this a case where there was any
viable threat that the phone data could be remotely wiped or destroyed.

Once
the officer had possession of the phone it could be immediately shut off or put
in `airplane mode’ and/or its battery removed, effectively eliminating any
possibility of such a remote intrusion pending examination of the phone in a
controlled environment. . . .

There would have been ample time, in other words,
for the agents to obtain a warrant, properly limited in scope, assuming the
officers had probable cause to justify the search.

Furthermore,
the privacy interests an individual has in his or her cell phone, given the
nature of such phones today, distinguishes it from an individual's wallet, . .
. which may be examined immediately upon arrest to confirm identity, among
other things, or a briefcase, which may contain a weapon, or other dangerous
instrumentality, or destructible evidence.

Modern cell phones, like [Dixon’s]
Samsung, are in effect mini-computers, and contain contacts, text messages,
photographs, calendars, notes and memos, instant messages, voice memos, and
e-mail messages—a wealth of private information held within a small digital
`container,’ as it were, but a different kind of container from a crumpled
cigarette package or even a footlocker.

As opposed to a footlocker, or a cigarette
pack, which are capable of holding other objects, a cell phone is an integrated
digital device that holds only data and digitally stored information.

U.S. v. Dixon, supra.

She also found that requiring

a warrant in these circumstances before
such a search may be conducted does not impair the legitimate interests of the
government in ensuring the safety of the arresting officers and the
preservation of any evidence. These interests were fully protected in this case
by immediately taking the phone from [Dixon’s] hands incident to his arrest and
securing it.

At the same time, by requiring a
warrant in this situation for the search of the phone, the legitimate privacy
interests of the arrestee can be protected, while still permitting the phone to
be immediately seized and preserved pending further action.

U.S. v. Dixon, supra.

Because the judge found Arrugueta violated Dixon’s 4th
Amendment rights “when he took Defendant's cell phone back to his office and
searched, downloaded, and extracted all the data he could from it and its
storage media”, she granted Dixon’s motion to suppress. U.S. v. Dixon, supra.

The Court of Appeals began its opinion by providing some
background on the case:

In October 2004, [Lykins] pleaded
guilty to conspiracy to manufacture and distribute methamphetamine. [He]
admitted in his plea agreement that he had been a member of the conspiracy for
approximately six months and had actively participated in manufacturing and
distributing methamphetamine. [Lykins] was sentenced to 60 months'
imprisonment, followed by five years of supervised release. [He] was released
from federal custody in August 2009 and began his term of supervised release.

As
a condition of supervised release, `[Lykins] was ordered to “permit a probation
officer to visit him . . . at any time at home or elsewhere and shall permit
confiscation of any contraband observed in plain view of the probation
officer.”’ U.S. v. Lykins, 2012 WL 1947346 (U.S. District Court for the Eastern District of Kentucky 2012) (quoting [Lykins’] release
agreement)). [Lykins] also agreed to ‘”submit his person, residence and
curtilage, office or vehicle to a search, upon direction and discretion of the
United States Probation Office.”’ U.S. v.
Lykins release agreement.

U.S. v. Lykins, supra.

The court then outlined how this prosecution arose:

[Lykins’] first two years of supervised
release proceeded without major incident. But on September 12, 2011, his
probation officer, John D'Alessandro, received an undated, anonymous letter
stating that `[s]omeone really needs to check on Jimmy Lykins. He is out of
control and needs drug tested [sic].’ Id. at *2. Prompted by
this letter, D'Alessandro visited [Lykins’] residence on October 12, 2011.

D'Alessandro originally intended to
conduct a home inspection, meaning he would walk though [Lykins’] home and look
for anything suspicious in plain view. But once [he] arrived at [Lykins’] home,
accompanied by Craig Peoples, the local sheriff, D'Alessandro changed his mind
and ordered a full search. That search turned up voluminous evidence of
methamphetamine manufacturing, including chemical precursors and hardware
needed to make the drug. D'Alessandro also found a .38–caliber revolver in the
microwave oven.

[Lykins]
was arrested after the search by state officials. A federal prosecution began
in January 2012, when [he] was indicted in the United States District Court for
the Eastern District of Kentucky for manufacturing methamphetamine and being a
felon in possession of a firearm.
[Lykins] was transferred into federal custody and pleaded not guilty to all
counts.

U.S. v. Lykins, supra.

That brings us to the first issue Lykins raised in his
appeal – his argument that the U.S. District Court Judge erred in denying his
motion to suppress certain evidence. U.S.
v. Lykins, supra.The District Court
judge “held an evidentiary hearing, focusing on the facts supporting
D'Alessandro's decision to order a full-fledged search, not just a home
inspection.” U.S. v. Lykins, supra.

The Court of Appeals began by summarizing what the evidence
presented at that hearing established about what happened before D’Allessandro
arrived at Lykins’ home:

In D'Alessandro's recounting, as he was
en route to [Lykins] home on October 12, 2011, he stopped by the office of the
sheriff of Pendleton County, Kentucky – Peoples --to speak about an unrelated
matter. When D'Alessandro mentioned his ultimate destination, Peoples mentioned
that he had just received an e-mail notification from the National Precursor Log Exchange (`NPLEx’) stating that [Lykins’] wife had just purchased a
methamphetamine precursor nearby.

NPLEx is an online system that tracks
sales of methamphetamine precursors. The NPLEx e-mail listed [Lykins’] address
as one of his wife's last known addresses. Peoples had been investigating [Lykins]
and his wife for possible involvement with methamphetamine manufacturing. . . .

[W]hen Peoples received an NPLEx notice
concerning an individual under investigation, it led him `to believe that if
they're not preparing to manufacture methamphetamine that day, then they will
maybe in the, in the next day or so.’ Suppression Hearing Transcript 154.
Peoples shared these concerns with D'Alessandro. D'Alessandro suspected [Lykins]
might be using or manufacturing methamphetamine in his home and set off for
there with Peoples in tow.

U.S. v. Lykins, supra.

The court then described what happened after D’Allessandro
and Peoples arrived at

[Lykins] home shortly after leaving
Peoples' office. The car belonging to [Lykins’] wife was nowhere to be seen.
D'Alessandro knocked on [Lykins’] front door, and [he] promptly answered.
D'Alessandro told [Lykins] that he was concerned [Lykins] was violating his
release conditions. [Lykins] voluntarily let D'Alessandro inside.

What happened next is the subject of
controversy. D'Alessandro testified that, as he entered the residence, he held
the door open for Peoples to come in with him. Peoples had originally gone
around to the side of [Lykins’] residence. Peoples testified that he followed
D'Alessandro into the residence, but that `[i]t took [him] a few minutes,
seconds to get from where [he] was standing at the end of the trailer up to
D'Alessandro at the front door.’ . . . .

At a proceeding in state court prior to
the federal government taking over [Lykins’] prosecution, Peoples had testified
that he entered the residence a few minutes after D'Alessandro. [Lykins], who
testified at the suppression hearing, reported that Peoples and D'Alessandro
came in separately. But under cross-examination, [he] conceded he was unsure
how much time passed before Peoples entered. Weighing this evidence, the
district court found `D'Alessandro walked in first and held the door open for
Peoples to follow.’ U.S. v. Lykins, 2012 WL 1947346, supra.

U.S. v. Lykins, supra.

The Court of Appeals noted that these details mattered
because of

what Peoples ostensibly said to D'Alessandro as they
entered. [Lykins] was cooking
hamburgers, and the smell filled the home. But as Peoples testified: `First
breaking through the threshold of the home, I received a smell, an odor that I
knew was a chemical odor, and in this instance it was camping fuel or Coleman
fuel.’ Suppression Hearing Transcript 157.

Peoples had extensive training and
experience concerning methamphetamine manufacturing, and knew that `Coleman
fuel or camping fuel is one of the ingredients used in the manufacture of
methamphetamine.’ . . . The smell of the fuel made Peoples
suspect that methamphetamine was being cooked in [Lykins’] home.

D'Alessandro also smelled hamburgers
cooking as he entered the home, but testified that Peoples drew his attention
to the smell of the fuel. The district court heard a range of testimony about
this brief conversation. Peoples testified that he asked D'Alessandro `if he
smelled that,’ but did not recall the exact words he used. . . .

D'Alessandro initially testified during
the suppression hearing that `right when we were entering the door, the sheriff
tapped me on the shoulder and asked me if I smelled something’ apart from the
hamburgers. . . . On cross-examination, D'Alessandro
elaborated: `the sheriff indicated that he smelled what he indicated was a
methamphetamine precursor. . . . When I crossed the threshold [ ] the sheriff
said hey, I smell something I know could be methamphetamine trafficking.’ . . .

From this testimony, the district court
found that `Peoples tapped D'Alessandro on the shoulder and asked if he smelled
something. Peoples described the smell to D'Alessandro, at which time
D'Alessandro distinguished the chemical odor from the hamburgers. . . . Peoples
also indicated to D'Alessandro that the chemical odor smelled like Coleman
fuel, a potential ingredient used to manufacture methamphetamine.’ U.S. v.
Lykins, 2012 WL 1947346, supra. (footnotes
omitted).

According to D'Alessandro, once Peoples informed him of the fuel
smell and its import, D'Alessandro decided to conduct a full search.

U.S. v. Lykins, supra.

On appeal, Lykins argued that the District Court judge “should
have granted his motion to suppress the evidence obtained from the search of
his home.” U.S. v. Lykins, supra. The
opinion does not explain precisely what he argued, but it clearly was based on
the premise that searching his home violated the requirements of the 4th Amendment.

The Court of Appeals noted that

`[w]hen reviewing a district court's
decision on a motion to suppress, we review its findings of fact for clear error and its legal conclusions de novo.’ U.S. v. Lyons, 687 F.3d 754 (U.S. Court of
Appeals for the 6th Circuit 2012). `A factual finding is clearly erroneous when
a court, on reviewing the evidence, is left with the definite and firm
conviction that a mistake has been committed.” U.S. v. Gunter, 551
F.3d 472 (U.S. Court of Appeals for the 6th Circuit 2009).

U.S. v. Lykins, supra.

The court then took up the legality of the search of Lykins’
home, noting that it was

The key circumstances in Knights were
the defendant's status as a California state parolee -- which affected both his
privacy interest and the government's interest in protecting the public -- and
the search condition placed on the defendant's parole. See U.S. v. Knights,
supra. Considering these circumstances, the search in Knights
required only reasonable suspicion that criminal activity was afoot. See
U.S. v. Knights, supra.

In the instant case, the district court
concluded that the reasoning of Knights meant that
D'Alessandro required only reasonable suspicion before ordering the search. See U.S.
v. Lykins, 2012 WL 1947346, supra.
Unlike the defendant in Knights, though, , [Lykins] was on
federal supervised release . . . and the search conditions on his release were
less invasive than those in Knights. But based on the facts of
the case before us, we need not resolve whether reasonable suspicion alone
would have justified this search. Even if the standard were as high as probable
cause, the search of [Lykins’] residence was constitutional.

U.S. v. Lykins, supra.

The Court of Appeals also noted that probable cause exists
when an officer has

`reasonable grounds for belief,
supported by less than prima facieproof but more than mere
suspicion . . . [that] there is a fair probability that contraband or evidence
of a crime will be found in a particular place.’ U.S. v. Lyons, 687 F.3d
754 (U.S. Court of Appeals for the 6th Circuit 2012).

On appeal, the government contends that
four facts justify the search of [Lykins’] home: [His] prior conviction, the
anonymous letter, the NPLEx e-mail, and the odor that Peoples smelled. The
district court correctly concluded that the anonymous letter carries little
weight in this analysis -- it simply prompted D'Alessandro to visit [Lykins’]
home. . . .

But the remaining facts -- the NPLEx
e-mail, [Lykins’] history of manufacturing methamphetamine, and, above all, the
odor of a methamphetamine precursor -- together gave D'Alessandro probable
cause to believe that criminal activity was afoot. . . .

U.S. v. Lykins, supra.

The court pointed out that its analysis “would be more
complicated” if the district court judge had “clearly erred in finding that
Peoples had told D'Alessandro that Peoples smelled Coleman fuel, and that this
fuel was an ingredient of methamphetamine”. U.S.
v. Lykins, supra.But it could not
“conclude . . . that this finding was clear error” because while the district
court judge had “heard conflicting testimony on whether Peoples and
D'Alessandro entered” the Lykins home together, the testimony “did not entirely
overlap, but nor did they contradict one another.” U.S. v. Lykins, supra.

The court then noted that the district court judge’s

factual finding thus rests primarily on
D'Alessandro's credibility. We accord great deference to a district court's
credibility determination made during a suppression hearing. . . . The district
court implicitly credited D'Alessandro's version of events.

Given our due
deference to the district court's findings of fact, we cannot conclude this
reliance was clear error. Because the district court's factual findings remain
undisturbed, so does the legal conclusion that follows from the totality of the
circumstances.

U.S. v. Lykins, supra.It therefore held that the district court
judge did not err in denying Lykins’ motion to suppress.U.S. v.
Lykins, supra.For this and other
reasons, the Court of Appeals affirmed Lykins’ convictions and sentence.U.S. v.
Lykins, supra.